CN117278263A - Authentication processing method, authentication processing device, computer equipment and storage medium - Google Patents

Authentication processing method, authentication processing device, computer equipment and storage medium Download PDF

Info

Publication number
CN117278263A
CN117278263A CN202311175947.1A CN202311175947A CN117278263A CN 117278263 A CN117278263 A CN 117278263A CN 202311175947 A CN202311175947 A CN 202311175947A CN 117278263 A CN117278263 A CN 117278263A
Authority
CN
China
Prior art keywords
authentication
target
request
open source
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311175947.1A
Other languages
Chinese (zh)
Inventor
张�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Health Insurance Company of China Ltd
Original Assignee
Ping An Health Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Health Insurance Company of China Ltd filed Critical Ping An Health Insurance Company of China Ltd
Priority to CN202311175947.1A priority Critical patent/CN117278263A/en
Publication of CN117278263A publication Critical patent/CN117278263A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application belongs to the field of big data and the field of financial science and technology, and relates to an authentication processing method, which comprises the following steps: acquiring an authentication request which is sent by a target open source tool and corresponds to a target service system, and acquiring an account authentication protocol supported by the target open source tool; a target authentication system based on an account authentication protocol; request validity authentication is carried out on the authentication request through a target authentication system; if the validity authentication is passed, processing the authentication request, and sending a target authentication request to a target service system; receiving an authentication result returned by the target service system; and returning the authentication result to the target open source tool through the target authentication system. The application also provides an authentication processing device, a computer device and a storage medium. In addition, the application also relates to a blockchain technology, and the authentication result can be stored in the blockchain. The method and the device can be applied to the product recommendation scene in the financial field, and effectively meet the requirement of processing account authentication corresponding to the target business system in the target open source tool.

Description

Authentication processing method, authentication processing device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of big data technologies and financial technologies, and in particular, to an authentication processing method, an authentication processing device, a computer device, and a storage medium.
Background
Internal account authentication systems are typically developed in financial and technology companies, such as insurance companies, banks, etc., and typically support three modes, 1. Api interface, 2. Page embedding, 3. Jumping. However, these account authentication systems are for some externally introduced open source tools, such as the data visualization tool Grafana, the enterprise-level monitoring solution tool of the open source that is mature in the industry, night warriors, etc., and because these open source tools usually have a set of account authentication systems supporting some account authentication protocols, the account authentication systems inside the finance and technology company cannot support these account authentication protocols, so that they cannot interface with these open source tools, which results in failing to meet the requirements of account authentication of the open source tools.
Disclosure of Invention
An objective of the embodiments of the present application is to provide an authentication processing method, an apparatus, a computer device, and a storage medium, so as to solve the technical problem that the existing account authentication system in a finance and technology company cannot support account authentication protocols of some open source tools introduced from outside, so that the open source tools cannot be docked, and the requirements of account authentication of the open source tools cannot be met.
In order to solve the above technical problems, the embodiments of the present application provide an authentication processing method, which adopts the following technical schemes:
after triggering a login request corresponding to a target service system in a preset target open source tool, a user acquires an authentication request corresponding to the target service system, which is sent by the target open source tool; wherein the authentication request carries account authentication information of the user;
acquiring an account authentication protocol supported by the target open source tool;
determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
request validity authentication is carried out on the authentication request through the target authentication system;
if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system;
receiving an authentication result corresponding to the target authentication request returned by the target service system;
and returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
Further, the step of obtaining the account authentication protocol supported by the target open source tool specifically includes:
acquiring a preset account authentication protocol information acquisition request;
sending the account authentication protocol information acquisition request to the target open source tool;
and receiving the account authentication protocol corresponding to the authentication protocol information acquisition request returned by the target open source tool.
Further, the step of determining a target authentication system corresponding to the account authentication protocol from the preset authentication systems specifically includes:
calling a preset protocol-system mapping data table;
acquiring a designated account authentication protocol matched with the account authentication protocol from the protocol-system mapping data table;
acquiring appointed authentication system information corresponding to the appointed account authentication protocol from the protocol-system mapping data table;
and screening the appointed authentication systems corresponding to the appointed authentication system information from all the authentication systems to obtain the target authentication system.
Further, the step of performing, by the target authentication system, a request validity authentication on the authentication request specifically includes:
Acquiring the account authentication information carried in the authentication request through the target authentication system
Judging whether the account authentication information accords with preset compliance conditions or not;
if the compliance condition is met, judging that the authentication request passes legal authentication;
and if the compliance condition is not met, judging that the authentication request fails legal authentication.
Further, the step of processing the authentication request and sending the target authentication request obtained after processing to the target service system specifically includes:
acquiring a request processing rule corresponding to the target service system;
processing the authentication request based on the request processing rule to obtain a processed target authentication request;
calling a target interface;
and sending the authentication request to the target service system through the target interface.
Further, the step of returning the authentication result to the target open source tool through the target authentication system specifically includes:
if the authentication result is authentication failure, generating a corresponding authentication failure message based on the authentication result;
generating a first sending instruction corresponding to the authentication failure message;
Transmitting the first sending instruction to the target authentication system so as to return the authentication failure message to the target open source tool through the target authentication system.
Further, the step of returning the authentication result to the target open source tool through the target authentication system specifically includes:
if the authentication result is that the authentication is successful, generating target token information corresponding to the user; wherein the target token information has uniqueness;
generating a second sending instruction corresponding to the target token information;
and transmitting the second sending instruction to the target authentication system so as to return the target token information to the target open source tool through the target authentication system.
In order to solve the above technical problems, the embodiments of the present application further provide an authentication processing apparatus, which adopts the following technical scheme:
the first acquisition module is used for acquiring an authentication request which is sent by a target open source tool and corresponds to a target service system after a user triggers a login request which corresponds to the target service system in a preset target open source tool; wherein the authentication request carries account authentication information of the user;
The second acquisition module is used for acquiring an account authentication protocol supported by the target open source tool;
the determining module is used for determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
the first processing module is used for carrying out request validity authentication on the authentication request through the target authentication system;
the second processing module is used for processing the authentication request if the validity authentication passes, and sending the processed target authentication request to the target service system;
the receiving module is used for receiving an authentication result corresponding to the target authentication request returned by the target service system;
and the return module is used for returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
In order to solve the above technical problems, the embodiments of the present application further provide a computer device, which adopts the following technical schemes:
after triggering a login request corresponding to a target service system in a preset target open source tool, a user acquires an authentication request corresponding to the target service system, which is sent by the target open source tool; wherein the authentication request carries account authentication information of the user;
Acquiring an account authentication protocol supported by the target open source tool;
determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
request validity authentication is carried out on the authentication request through the target authentication system;
if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system;
receiving an authentication result corresponding to the target authentication request returned by the target service system;
and returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
In order to solve the above technical problems, embodiments of the present application further provide a computer readable storage medium, which adopts the following technical solutions:
after triggering a login request corresponding to a target service system in a preset target open source tool, a user acquires an authentication request corresponding to the target service system, which is sent by the target open source tool; wherein the authentication request carries account authentication information of the user;
Acquiring an account authentication protocol supported by the target open source tool;
determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
request validity authentication is carried out on the authentication request through the target authentication system;
if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system;
receiving an authentication result corresponding to the target authentication request returned by the target service system;
and returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
firstly, acquiring an authentication request corresponding to the target service system, which is sent by the target open source tool; then acquiring an account authentication protocol supported by the target open source tool; determining a target authentication system corresponding to the account authentication protocol from preset authentication systems; then, request legality authentication is carried out on the authentication request through the target authentication system; if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system; subsequently receiving an authentication result corresponding to the target authentication request returned by the target service system; and finally, returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result. According to the embodiment of the application, the pre-constructed target authentication system capable of supporting the account authentication protocol corresponding to the target open source tool is used for carrying out data interaction and data forwarding between the target open source tool and the target service system, so that the butt joint between the target service system and the target open source tool is indirectly realized, the target open source tool can be smoothly applied to the target service system, and the requirement of processing account authentication corresponding to the target service system in the target open source tool is effectively met.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of an authentication processing method according to the present application;
FIG. 3 is a schematic diagram of the structure of one embodiment of an authentication processing apparatus according to the present application;
FIG. 4 is a schematic structural diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture Experts Group Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the authentication processing method provided in the embodiments of the present application is generally executed by a server/terminal device, and accordingly, the authentication processing apparatus is generally disposed in the server/terminal device.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow chart of one embodiment of an authentication processing method according to the present application is shown. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The authentication processing method provided by the embodiment of the invention can be applied to any scene requiring account authentication about the open source tool, and can be applied to products of the scenes, such as account authentication about the open source tool in the field of financial insurance. The authentication processing method comprises the following steps:
Step S201, after a user triggers a login request corresponding to a target service system in a preset target open source tool, an authentication request corresponding to the target service system sent by the target open source tool is obtained.
In this embodiment, the electronic device (for example, the server/terminal device shown in fig. 1) on which the authentication processing method operates may acquire the image to be checked through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection may include, but is not limited to, 3G/4G/5G connection, wiFi connection, bluetooth connection, wiMAX connection, zigbee connection, UWB (ultra wideband) connection, and other now known or later developed wireless connection. The target open source tools can refer to common data visualization tools Grafana or enterprise-level monitoring solution tools of open sources which are mature in the industry, namely night warriors, and the like, and all the open source tools have a set of account authentication systems, and most of the open source tools can support common account authentication protocols, but the open source tools have the problem that account authentication cannot be performed by directly using a target service system. In an application scenario in the field of financial insurance, the target business system may include an insurance system, a banking system, a transaction system, an order system, and the like. Specifically, the login request is a request for logging in a target service system, which is triggered by a user in a target open source tool. The authentication request carries account authentication information of the user, and the account authentication information can include an account name of the user.
Step S202, obtaining an account authentication protocol supported by the target open source tool.
In this embodiment, the authentication system may be an authentication system including an account authentication protocol supporting LDAP (Lightweight Directory Access Protocol ), an authentication system supporting CAS (Central Authentication Service, centralized authentication service) account authentication protocol, an authentication system supporting OAUTH2 (open authorization) account authentication protocol, or the like. The authentication system can be a set of account authentication system which utilizes the Django framework of Python and the Vue front end framework to conduct self-research. In addition, the above specific implementation process of obtaining the account authentication protocol supported by the target open source tool will be described in further detail in the following specific embodiments, which are not described herein.
Step S203, determining a target authentication system corresponding to the account authentication protocol from preset authentication systems.
In this embodiment, the specific implementation process of determining the target authentication system corresponding to the account authentication protocol from the preset authentication systems is described in further detail in the following specific embodiments, which will not be described herein.
Step S204, request validity authentication is carried out on the authentication request through the target authentication system.
In this embodiment, the foregoing specific implementation process of performing request validity authentication on the authentication request by using the target authentication system will be described in further detail in the following specific embodiments, which will not be described herein.
Step S205, if the validity authentication is passed, processing the authentication request, and sending the processed target authentication request to the target service system.
In this embodiment, the processing is performed on the authentication request, and the target authentication request obtained after the processing is sent to a specific implementation process of the target service system, which will be described in further detail in the following specific embodiments, which will not be described herein.
Step S206, receiving an authentication result corresponding to the target authentication request returned by the target service system.
In this embodiment, the target service system may perform authentication processing on the target authentication request according to an internal authentication processing rule, and may generate an authentication result corresponding to the target authentication request. The authentication process may be to check whether an account name and an account password matched with the account authentication information in the target authentication request are stored in the target service system, if the account name and the account password matched with the account authentication information exist, an authentication result of successful authentication corresponding to the target authentication request is generated, and if the account name and the account password matched with the account authentication information do not exist, an authentication result of failed authentication corresponding to the target authentication request is generated.
Step S207, returning the authentication result to the target open source tool through the target authentication system, so that the target open source tool performs corresponding processing on the login request based on the authentication result.
In this embodiment, if the authentication result is that the authentication is successful, the user may implement account login in the open source tool, and may also interact with the target authentication system, and after the account login is successful, the service for resource access may be provided for the user in the open source tool, so that the account authentication problem and the security problem existing when the user uses the open source tool may be effectively solved. The above specific implementation process of returning the authentication result to the target open source tool through the target authentication system will be described in further detail in the following specific embodiments, which will not be described herein.
After triggering a login request corresponding to a target service system in a preset target open source tool, a user firstly obtains an authentication request corresponding to the target service system, which is sent by the target open source tool; then acquiring an account authentication protocol supported by the target open source tool; determining a target authentication system corresponding to the account authentication protocol from preset authentication systems; then, request legality authentication is carried out on the authentication request through the target authentication system; if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system; subsequently receiving an authentication result corresponding to the target authentication request returned by the target service system; and finally, returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result. According to the method and the device, the pre-built target authentication system which can support the account authentication protocol corresponding to the target open source tool is used for carrying out data interaction and data forwarding between the target open source tool and the target service system, so that the butt joint between the target service system and the target open source tool is indirectly realized, the target open source tool can be smoothly applied to the target service system, and the requirement of processing account authentication corresponding to the target service system in the target open source tool is effectively met.
In some alternative implementations, step S202 includes the steps of:
and acquiring a preset account authentication protocol information acquisition request.
In this embodiment, the account authentication protocol information obtaining request is a request that is pre-constructed and stored according to a service obtaining requirement of an actual account authentication protocol.
And sending the account authentication protocol information acquisition request to the target open source tool.
In this embodiment, the account authentication protocol information obtaining request is sent to the target open source tool, so as to instruct the target open source tool to return the account authentication protocol corresponding to the authentication protocol information obtaining request.
And receiving the account authentication protocol corresponding to the authentication protocol information acquisition request returned by the target open source tool.
The method comprises the steps of obtaining a preset account authentication protocol information obtaining request; then, the account authentication protocol information acquisition request is sent to the target open source tool; and subsequently receiving the account authentication protocol corresponding to the authentication protocol information acquisition request returned by the target open source tool. According to the method and the device for obtaining the account authentication protocol, the information query is carried out on the account authentication protocol information obtaining request and the target open source tool through the account authentication protocol information obtaining request which is built in advance, the account authentication protocol which is returned by the target open source tool and corresponds to the authentication protocol information obtaining request can be obtained rapidly, manual query on the account authentication protocol of the target open source tool is not needed, and the obtaining efficiency and the obtaining intelligence of the account authentication protocol are improved effectively.
In some alternative implementations of the present embodiment, step S203 includes the steps of:
and calling a preset protocol-system mapping data table.
In this embodiment, the protocol-system mapping data table is a data table previously constructed by a mapping relationship between account authentication protocols and authentication system information, where the protocol-system mapping data table stores a plurality of account authentication protocols and authentication system information of an authentication system corresponding to each account authentication protocol one by one.
And acquiring a designated account authentication protocol matched with the account authentication protocol from the protocol-system mapping data table.
In this embodiment, the account authentication protocol may be matched with all account authentication protocols included in the protocol-system mapping data table, and the successfully matched account authentication protocol may be used as the above specified account authentication protocol.
And acquiring the appointed authentication system information corresponding to the appointed account authentication protocol from the protocol-system mapping data table.
In this embodiment, the protocol-system mapping data table may be queried based on the specified account authentication protocol to query out specified authentication system information corresponding to the specified account authentication protocol.
And screening the appointed authentication systems corresponding to the appointed authentication system information from all the authentication systems to obtain the target authentication system.
In the present embodiment, a specified authentication system may be used as the target authentication system described above.
The method and the device call a preset protocol-system mapping data table; then acquiring a designated account authentication protocol matched with the account authentication protocol from the protocol-system mapping data table; then acquiring appointed authentication system information corresponding to the appointed account authentication protocol from the protocol-system mapping data table; subsequently acquiring a specified authentication system corresponding to the specified authentication system information; and finally, screening the appointed authentication system corresponding to the appointed authentication system information from all the authentication systems to obtain the target authentication system. According to the method and the system, the protocol-system mapping data table is queried based on the use of the account authentication protocol to obtain the appointed account authentication protocol matched with the account authentication protocol, and then the target authentication system corresponding to the appointed authentication system information is screened out from all authentication systems, so that the target authentication system is quickly searched, the subsequent request validity authentication of an authentication request can be accurately carried out through the target authentication system, and data communication with a target service system is realized through the target authentication system.
In some alternative implementations, step S204 includes the steps of:
and acquiring the account authentication information carried in the authentication request through the target authentication system.
In this embodiment, the account authentication information carried in the authentication request may be obtained by performing information analysis on the authentication request. Account authentication information. The user's account name may be included.
And judging whether the account authentication information accords with preset compliance conditions.
In this embodiment, the content of the compliance condition is not specifically limited, and may be set according to the actual service compliance verification requirement. Preferably, the compliance condition may refer to information whether the account authentication information belongs to a compliance account, i.e., whether the account name of the user belongs to the account name of the compliance account.
And if the compliance condition is met, judging that the authentication request passes legal authentication.
In this embodiment, if the account authentication information belongs to information of a compliant account, it indicates that the account authentication information meets the compliance condition, that is, the validity of the account authentication information through the target authentication system is authenticated.
And if the compliance condition is not met, judging that the authentication request fails legal authentication.
In this embodiment, if the account authentication information does not belong to the information of the compliant account, it indicates that the account authentication information does not conform to the compliance condition, that is, the account authentication information does not pass the validity authentication of the target authentication system.
The account authentication information carried in the authentication request is acquired through the target authentication system; then judging whether the account authentication information accords with preset compliance conditions; if the compliance condition is met, judging that the authentication request passes legal authentication; and if the compliance condition is not met, judging that the authentication request fails legal authentication. According to the method and the device, the user account authentication information is checked by using the preset compliance condition, the legal authentication result of the authentication request can be rapidly and accurately generated according to the check result, and the accuracy of the generated legal authentication result is ensured. And the subsequent business processing flow can be performed based on the validity authentication result, so that the subsequent business processing flow can be ensured to be performed smoothly.
In some alternative implementations, step S205 includes the steps of:
and acquiring a request processing rule corresponding to the target service system.
In this embodiment, the request processing rule is a processing rule constructed according to a requirement of generating a standard format conforming to a target service system processing request.
And processing the authentication request based on the request processing rule to obtain a processed target authentication request.
In this embodiment, by processing the authentication request based on the request processing rule, a target authentication request conforming to the standard format of the target service system processing request can be obtained.
The target interface is invoked.
In this embodiment, the target interface is a pre-constructed interface for performing data interaction with the target service system.
And sending the authentication request to the target service system through the target interface.
In this embodiment, the authentication request may be forwarded to the target business system by using the invoked target interface.
The request processing rule corresponding to the target service system is obtained; then processing the authentication request based on the request processing rule to obtain a processed target authentication request; then, a target interface is called; and subsequently sending the authentication request to the target service system through the target interface. According to the method and the device, the authentication request is processed by using the request processing rule corresponding to the target service system, so that the target authentication request which accords with the standard format of the target service system processing request can be generated rapidly, and the target service system can accurately finish the authentication processing of the authentication request after the authentication request is sent to the target service system by using the target interface, so that an accurate authentication result is generated.
In some alternative implementations of the present embodiment, step S207 includes the steps of:
and if the authentication result is authentication failure, generating a corresponding authentication failure message based on the authentication result.
In this embodiment, the authentication result may be filled into the authentication failure message template by acquiring the authentication failure message template, so as to generate a corresponding authentication failure message. The authentication failure message template is a message template which is constructed in advance according to the authentication failure reminding requirement.
And generating a first sending instruction corresponding to the authentication failure message.
In this embodiment, the first sending instruction corresponds to an instruction for controlling the target authentication system to return the authentication failure message to the target open source tool.
Transmitting the first sending instruction to the target authentication system so as to return the authentication failure message to the target open source tool through the target authentication system.
In this embodiment, the target authentication system, after receiving the first transmission instruction, performs an operation of returning the authentication failure message to the target open source tool.
When the authentication result is detected to be authentication failure, generating a corresponding authentication failure message based on the authentication result; then generating a first sending instruction corresponding to the authentication failure message; and subsequently transmitting the first sending instruction to the target authentication system so as to return the authentication failure message to the target open source tool through the target authentication system. After the authentication result is detected to be authentication failure, the authentication failure message corresponding to the authentication result generation and the first sending instruction corresponding to the authentication failure message are intelligently generated, and the target authentication system is controlled to return the authentication failure message to the target open source tool based on the first sending instruction, so that the operation of returning the authentication result to the target open source tool is successfully completed, and the smoothness of the transmission of the authentication result is improved.
In some alternative implementations of the present embodiment, step S207 includes the steps of:
and if the authentication result is that the authentication is successful, generating target token information corresponding to the user.
In this embodiment, the target token information has uniqueness. The generation mode of the target token information is not limited, and the target token information is only required to be ensured to have relevance with the user and to have uniqueness. The target token information is an authorization credential corresponding to the authorization of accessing the resource to the user.
And generating a second sending instruction corresponding to the target token information.
In this embodiment, the second sending instruction corresponds to an instruction for controlling the target authentication system to return the target token information to the target open source tool.
And transmitting the second sending instruction to the target authentication system so as to return the target token information to the target open source tool through the target authentication system. After receiving the target token information, the target authentication system saves the target token information and can acquire user information of the user based on the target token information.
In this embodiment, the target authentication system executes the operation of returning the target token information to the target open source tool after receiving the second transmission instruction. After receiving the target token information, the target token information can be further used for realizing account login in the source-opening tool, the target token information can be used for interacting with a target authentication system, and after the account login is successful, a service for resource access can be provided for a user in the source-opening tool.
If the authentication result is detected to be successful, generating target token information corresponding to the user; then generating a second sending instruction corresponding to the target token information; and subsequently transmitting the second sending instruction to the target authentication system so as to return the target token information to the target open source tool through the target authentication system. After the authentication result is detected to be successful, the method and the system also intelligently generate target token information corresponding to the user and generate a second sending instruction corresponding to the target token information, and further control the target authentication system to return the target token information to the target open source tool based on the second sending instruction, so that the user can realize account login in the open source tool by using the target token information, interact with the target authentication system by using the target token information, and provide resource access service for the user in the open source tool after the account login is successful, and further effectively solve account authentication problems and security problems existing in the use of the open source tool for the user.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
It should be emphasized that, to further ensure the privacy and security of the authentication results, the authentication results may also be stored in a blockchain node.
The blockchain referred to in the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by computer readable instructions stored in a computer readable storage medium that, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an authentication processing apparatus, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 3, the authentication processing apparatus 300 according to the present embodiment includes: a first acquisition module 301, a second acquisition module 302, a determination module 303, a first processing module 304, a second processing module 305, a receiving module 306, and a return module 307. Wherein:
the first obtaining module 301 is configured to obtain an authentication request corresponding to a target service system sent by a target open source tool after a user triggers a login request corresponding to the target service system in a preset target open source tool; wherein the authentication request carries account authentication information of the user;
a second obtaining module 302, configured to obtain an account authentication protocol supported by the target open source tool;
a determining module 303, configured to determine a target authentication system corresponding to the account authentication protocol from preset authentication systems;
a first processing module 304, configured to perform request validity authentication on the authentication request through the target authentication system;
The second processing module 305 is configured to process the authentication request if the validity authentication passes, and send a target authentication request obtained after the processing to the target service system;
a receiving module 306, configured to receive an authentication result returned by the target service system and corresponding to the target authentication request;
and a return module 307, configured to return the authentication result to the target open source tool through the target authentication system, so that the target open source tool performs corresponding processing on the login request based on the authentication result.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the second obtaining module 302 includes:
the first acquisition sub-module is used for acquiring a preset account authentication protocol information acquisition request;
the first sending submodule is used for sending the account authentication protocol information acquisition request to the target open source tool;
and the receiving sub-module is used for receiving the account authentication protocol corresponding to the authentication protocol information acquisition request returned by the target open source tool.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the determining module 303 includes:
the first calling sub-module is used for calling a preset protocol-system mapping data table;
a second obtaining sub-module, configured to obtain a specified account authentication protocol matched with the account authentication protocol from the protocol-system mapping data table;
a third obtaining sub-module, configured to obtain specified authentication system information corresponding to the specified account authentication protocol from the protocol-system mapping data table;
and the screening sub-module is used for screening the appointed authentication system corresponding to the appointed authentication system information from all the authentication systems to obtain the target authentication system.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the first processing module 304 includes:
a fourth obtaining sub-module, configured to obtain, through the target authentication system, the account authentication information carried in the authentication request
The judging sub-module is used for judging whether the account authentication information accords with preset compliance conditions;
the first judging submodule is used for judging that the authentication request passes the legal authentication if the compliance condition is met;
and the second judging submodule is used for judging that the authentication request fails the legal authentication if the compliance condition is not met.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the second processing module 305 includes:
a fifth obtaining sub-module, configured to obtain a request processing rule corresponding to the target service system;
the processing sub-module is used for processing the authentication request based on the request processing rule to obtain a processed target authentication request;
the second calling sub-module is used for calling the target interface;
and the second sending submodule is used for sending the authentication request to the target service system through the target interface.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the return module 307 includes:
the first generation sub-module is used for generating a corresponding authentication failure message based on the authentication result if the authentication result is authentication failure;
the second generation sub-module is used for generating a first sending instruction corresponding to the authentication failure message;
and the first transmission sub-module is used for transmitting the first sending instruction to the target authentication system so as to return the authentication failure message to the target open source tool through the target authentication system.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the return module 307 includes:
the third generation module is used for generating target token information corresponding to the user if the authentication result is that the authentication is successful; wherein the target token information has uniqueness;
the fourth generation module is used for generating a second sending instruction corresponding to the target token information;
and the second transmission module is used for transmitting the second sending instruction to the target authentication system so as to return the target token information to the target open source tool through the target authentication system.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the authentication processing method in the foregoing embodiment one by one, and are not described herein again.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 4, fig. 4 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It should be noted that only computer device 4 having components 41-43 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 4. Of course, the memory 41 may also comprise both an internal memory unit of the computer device 4 and an external memory device. In this embodiment, the memory 41 is typically used to store an operating system and various application software installed on the computer device 4, such as computer readable instructions of an authentication processing method. Further, the memory 41 may be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, such as computer readable instructions for executing the authentication processing method.
The network interface 43 may comprise a wireless network interface or a wired network interface, which network interface 43 is typically used for establishing a communication connection between the computer device 4 and other electronic devices.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, an authentication request corresponding to the target service system, which is sent by the target open source tool, is acquired; then acquiring an account authentication protocol supported by the target open source tool; determining a target authentication system corresponding to the account authentication protocol from preset authentication systems; then, request legality authentication is carried out on the authentication request through the target authentication system; if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system; subsequently receiving an authentication result corresponding to the target authentication request returned by the target service system; and finally, returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result. According to the embodiment of the application, the pre-constructed target authentication system capable of supporting the account authentication protocol corresponding to the target open source tool is used for carrying out data interaction and data forwarding between the target open source tool and the target service system, so that the butt joint between the target service system and the target open source tool is indirectly realized, the target open source tool can be smoothly applied to the target service system, and the requirement of processing account authentication corresponding to the target service system in the target open source tool is effectively met.
The present application also provides another embodiment, namely, a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the authentication processing method as described above.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, an authentication request corresponding to the target service system, which is sent by the target open source tool, is acquired; then acquiring an account authentication protocol supported by the target open source tool; determining a target authentication system corresponding to the account authentication protocol from preset authentication systems; then, request legality authentication is carried out on the authentication request through the target authentication system; if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system; subsequently receiving an authentication result corresponding to the target authentication request returned by the target service system; and finally, returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result. According to the embodiment of the application, the pre-constructed target authentication system capable of supporting the account authentication protocol corresponding to the target open source tool is used for carrying out data interaction and data forwarding between the target open source tool and the target service system, so that the butt joint between the target service system and the target open source tool is indirectly realized, the target open source tool can be smoothly applied to the target service system, and the requirement of processing account authentication corresponding to the target service system in the target open source tool is effectively met.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. An authentication processing method, comprising the steps of:
after triggering a login request corresponding to a target service system in a preset target open source tool, a user acquires an authentication request corresponding to the target service system, which is sent by the target open source tool; wherein the authentication request carries account authentication information of the user;
acquiring an account authentication protocol supported by the target open source tool;
determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
request validity authentication is carried out on the authentication request through the target authentication system;
if the validity authentication is passed, processing the authentication request, and sending a target authentication request obtained after processing to the target service system;
receiving an authentication result corresponding to the target authentication request returned by the target service system;
and returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
2. The authentication processing method according to claim 1, wherein the step of obtaining an account authentication protocol supported by the target open source tool specifically includes:
Acquiring a preset account authentication protocol information acquisition request;
sending the account authentication protocol information acquisition request to the target open source tool;
and receiving the account authentication protocol corresponding to the authentication protocol information acquisition request returned by the target open source tool.
3. The authentication processing method according to claim 1, wherein the step of determining a target authentication system corresponding to the account authentication protocol from among preset authentication systems specifically includes:
calling a preset protocol-system mapping data table;
acquiring a designated account authentication protocol matched with the account authentication protocol from the protocol-system mapping data table;
acquiring appointed authentication system information corresponding to the appointed account authentication protocol from the protocol-system mapping data table;
and screening the appointed authentication systems corresponding to the appointed authentication system information from all the authentication systems to obtain the target authentication system.
4. The authentication processing method according to claim 1, wherein the step of performing request validity authentication on the authentication request by the target authentication system specifically includes:
Acquiring the account authentication information carried in the authentication request through the target authentication system
Judging whether the account authentication information accords with preset compliance conditions or not;
if the compliance condition is met, judging that the authentication request passes legal authentication;
and if the compliance condition is not met, judging that the authentication request fails legal authentication.
5. The authentication processing method according to claim 1, wherein the step of processing the authentication request and transmitting the target authentication request obtained after the processing to the target service system specifically comprises:
acquiring a request processing rule corresponding to the target service system;
processing the authentication request based on the request processing rule to obtain a processed target authentication request;
calling a target interface;
and sending the authentication request to the target service system through the target interface.
6. The authentication processing method according to claim 1, wherein the step of returning the authentication result to the target open source tool by the target authentication system specifically comprises:
if the authentication result is authentication failure, generating a corresponding authentication failure message based on the authentication result;
Generating a first sending instruction corresponding to the authentication failure message;
transmitting the first sending instruction to the target authentication system so as to return the authentication failure message to the target open source tool through the target authentication system.
7. The authentication processing method according to claim 1, wherein the step of returning the authentication result to the target open source tool by the target authentication system specifically comprises:
if the authentication result is that the authentication is successful, generating target token information corresponding to the user; wherein the target token information has uniqueness;
generating a second sending instruction corresponding to the target token information;
and transmitting the second sending instruction to the target authentication system so as to return the target token information to the target open source tool through the target authentication system.
8. An authentication processing apparatus, comprising:
the first acquisition module is used for acquiring an authentication request which is sent by a target open source tool and corresponds to a target service system after a user triggers a login request which corresponds to the target service system in a preset target open source tool; wherein the authentication request carries account authentication information of the user;
The second acquisition module is used for acquiring an account authentication protocol supported by the target open source tool;
the determining module is used for determining a target authentication system corresponding to the account authentication protocol from preset authentication systems;
the first processing module is used for carrying out request validity authentication on the authentication request through the target authentication system;
the second processing module is used for processing the authentication request if the validity authentication passes, and sending the processed target authentication request to the target service system;
the receiving module is used for receiving an authentication result corresponding to the target authentication request returned by the target service system;
and the return module is used for returning the authentication result to the target open source tool through the target authentication system so that the target open source tool can correspondingly process the login request based on the authentication result.
9. A computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the authentication processing method of any of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the authentication processing method according to any of claims 1 to 7.
CN202311175947.1A 2023-09-12 2023-09-12 Authentication processing method, authentication processing device, computer equipment and storage medium Pending CN117278263A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311175947.1A CN117278263A (en) 2023-09-12 2023-09-12 Authentication processing method, authentication processing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311175947.1A CN117278263A (en) 2023-09-12 2023-09-12 Authentication processing method, authentication processing device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117278263A true CN117278263A (en) 2023-12-22

Family

ID=89220636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311175947.1A Pending CN117278263A (en) 2023-09-12 2023-09-12 Authentication processing method, authentication processing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117278263A (en)

Similar Documents

Publication Publication Date Title
CN112395390B (en) Training corpus generation method of intention recognition model and related equipment thereof
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN117251228A (en) Function management method, device, computer equipment and storage medium
CN117094729A (en) Request processing method, device, computer equipment and storage medium
CN116956326A (en) Authority data processing method and device, computer equipment and storage medium
CN116661936A (en) Page data processing method and device, computer equipment and storage medium
CN116681045A (en) Report generation method, report generation device, computer equipment and storage medium
CN116383787A (en) Page creation method, page creation device, computer equipment and storage medium
CN117278263A (en) Authentication processing method, authentication processing device, computer equipment and storage medium
CN117278510A (en) Message sending method, device, computer equipment and storage medium
CN116932090A (en) Tool pack loading method, device, computer equipment and storage medium
CN117390119A (en) Task processing method, device, computer equipment and storage medium
CN117422523A (en) Product online method and device, computer equipment and storage medium
CN117632331A (en) Data display method, device, computer equipment and storage medium
CN117390241A (en) Data display method, device, computer equipment and storage medium
CN117094827A (en) Data generation method, device, computer equipment and storage medium
CN116860644A (en) Automatic test method, device, computer equipment and storage medium
CN116822454A (en) Formula configuration method, device, computer equipment and storage medium
CN117112665A (en) Link data processing method and device, computer equipment and storage medium
CN117278623A (en) Method and device for processing request data, computer equipment and storage medium
CN116737437A (en) Data analysis method, device, computer equipment and storage medium
CN118227491A (en) Method and device for generating test cases, computer equipment and storage medium
CN117217684A (en) Index data processing method and device, computer equipment and storage medium
CN117348851A (en) Interface dynamic generation method, device, equipment and storage medium thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination